Feeds

Cutting the cord: future mobile broadband tech

How internet on the go is going to get much faster

Security for virtualized datacentres

Wireless telephony is undergoing a revolution, with technology and implementation philosophy each holding the other back in turn as the industry struggles towards wireless nirvana.

Engineers have spent the last few decades squeezing more data into the same wireless bandwidth, a process that is deep into the realm of diminishing returns. Meanwhile, regulators are loosening rules about what technologies can be deployed by whom, allowing the engineers to exploit new techniques that are defining the standards that will carry the next few decades.

LTE Advance Logo

Mobile telephony was predicated on the ability to make voice calls without wires, but the next generation of wireless standards consider voice calling to be a peripheral function. Instead, data takes central stage. Voice is, after all, just another kind of data. The wireless standards used for telephony today still have a separate channel for voice connections, but LTE (Long-Term Evolution) and WiMax (Worldwide Interoperability for Microwave Access) are both data networks designed to carry broadband data which might incorporate the occasional voice call too - a clear change of focus for the so-called fourth generation (4G) of mobile technologies.

Downloading some history, very slowly

Data was very much an afterthought in the design of the original mobile telephone - the first car phones could be connected to a modem which would squawk down the line at a horribly slow speed. In the UK, tech corporation ICL fitted all its engineers' cars with such modems, and phones to go with them, but it never managed to get a data service working reliably over a network that was ill equipped to handle mission-critical data.

Second-generation technology GSM wasn't a lot better, so wireless data remained something for the desperate specialist despite the launch of Wap (Wireless Application Protocol). Wap promised to deliver the internet on the move, a promise that was made though legendary TV ads that have actually been blamed for killing Wap by setting unrealistic expectations:

There followed a sequence of steps in which the industry repeatedly deluded itself that as soon as data connections could be made slightly faster, users would leap to the wireless internet - and be delighted to pay for it.

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Monitors monitor's monitoring finds touch screens have 0.4% market share
Not four. Point four. Count yer booty again, Microsoft
Getting to the BOTTOM of the great office seating debate
Belay that toil, me hearty, and park your scurvy backside
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
In a spin: Samsung accuses LG exec of washing machine SABOTAGE
Rival electronic giant tries to iron out allegations
Your chance to WIN the WORLD'S ONLY HANDHELD ZX SPECTRUM
Reg staff not allowed to enter, god dammit
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.